This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Redhat First view 2015-11-25
Product Openshift Container Platform Last view 2024-01-09
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:* 124
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* 56
cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:* 36
cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:* 23
cpe:2.3:a:redhat:openshift_container_platform:3.3:*:*:*:*:*:*:* 21
cpe:2.3:a:redhat:openshift_container_platform:3.1:*:*:*:*:*:*:* 20
cpe:2.3:a:redhat:openshift_container_platform:3.2:*:*:*:*:*:*:* 20
cpe:2.3:a:redhat:openshift_container_platform:3.5:*:*:*:*:*:*:* 20
cpe:2.3:a:redhat:openshift_container_platform:3.4:*:*:*:*:*:*:* 20
cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:* 20
cpe:2.3:a:redhat:openshift_container_platform:3.6:*:*:*:*:*:*:* 19
cpe:2.3:a:redhat:openshift_container_platform:3.7:*:*:*:*:*:*:* 18
cpe:2.3:a:redhat:openshift_container_platform:2.2:*:*:*:*:*:*:* 18
cpe:2.3:a:redhat:openshift_container_platform:-:*:*:*:*:*:*:* 18
cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:* 17
cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:* 17
cpe:2.3:a:redhat:openshift_container_platform:4.6:*:*:*:*:*:*:* 16
cpe:2.3:a:redhat:openshift_container_platform:3.8:*:*:*:*:*:*:* 15
cpe:2.3:a:redhat:openshift_container_platform:3.9.31:*:*:*:*:*:*:* 14
cpe:2.3:a:redhat:openshift_container_platform:4.3:*:*:*:*:*:*:* 10
cpe:2.3:a:redhat:openshift_container_platform:4.4:*:*:*:*:*:*:* 10
cpe:2.3:a:redhat:openshift_container_platform:3.11.286:*:*:*:*:*:*:* 10
cpe:2.3:a:redhat:openshift_container_platform:4.5:*:*:*:*:*:*:* 9
cpe:2.3:a:redhat:openshift_container_platform:4.5.16:*:*:*:*:*:*:* 6
cpe:2.3:a:redhat:openshift_container_platform:4.6.1:*:*:*:*:*:*:* 6
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:* 6
cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:*:* 5
cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:* 5
cpe:2.3:a:redhat:openshift_container_platform:4.8:*:*:*:*:*:*:* 4
cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:* 4
cpe:2.3:a:redhat:openshift_container_platform:4.9:*:*:*:*:*:*:* 3
cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:* 2
cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:arm64:* 1
cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:arm64:* 1
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:arm64:* 1
cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:* 1

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.5 2024-01-09 CVE-2023-6476

A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.

8.1 2023-12-21 CVE-2023-2585

Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.

5.9 2023-12-18 CVE-2023-48795

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.

5.4 2023-12-14 CVE-2023-6134

A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.

7.2 2023-11-02 CVE-2023-5408

A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster.

7.5 2023-10-10 CVE-2023-44487

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

5.5 2023-10-06 CVE-2023-5366

A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.

5.3 2023-10-05 CVE-2022-4145

A content spoofing flaw was found in OpenShift's OAuth endpoint. This flaw allows a remote, unauthenticated attacker to inject text into a webpage, enabling the obfuscation of a phishing operation.

7.5 2023-10-05 CVE-2022-3248

A flaw was found in OpenShift API, as admission checks do not enforce "custom-host" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied.

5.3 2023-10-04 CVE-2023-3153

A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.

7.1 2023-10-04 CVE-2023-2422

A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.

8 2023-09-24 CVE-2023-1260

An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.

5.3 2023-09-15 CVE-2022-3466

The version of cri-o as released for Red Hat OpenShift Container Platform 4.9.48, 4.10.31, and 4.11.6 via RHBA-2022:6316, RHBA-2022:6257, and RHBA-2022:6658, respectively, included an incorrect version of cri-o missing the fix for CVE-2022-27652, which was previously fixed in OCP 4.9.41 and 4.10.12 via RHBA-2022:5433 and RHSA-2022:1600. This issue could allow an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. For more details, see https://access.redhat.com/security/cve/CVE-2022-27652.

7.5 2023-07-05 CVE-2023-3089

A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

6.5 2023-06-06 CVE-2023-2253

A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.

8.2 2023-04-10 CVE-2023-1668

A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.

5.5 2023-03-24 CVE-2021-3684

A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were leaked as plaintext in the installation logs. An authenticated user could exploit this by re-using the image pull secret to pull container images from the registry as the associated user.

6.5 2023-03-23 CVE-2023-0056

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

7 2023-03-03 CVE-2023-27561

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

5.9 2022-12-28 CVE-2021-4294

A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function ClientSecretMatches/CheckClientSecret. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987.

7.1 2022-09-13 CVE-2022-2990

An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

7.1 2022-09-13 CVE-2022-2989

An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.

6.3 2022-09-01 CVE-2022-1677

In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control.

6.5 2022-09-01 CVE-2022-1632

An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate validation. This flaw allows an attacker to exploit an invalid certificate, resulting in a loss of confidentiality.

8.6 2022-08-31 CVE-2022-2132

A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
9% (16) CWE-502 Deserialization of Untrusted Data
6% (11) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
4% (8) CWE-770 Allocation of Resources Without Limits or Throttling
4% (8) CWE-416 Use After Free
4% (8) CWE-20 Improper Input Validation
4% (7) CWE-532 Information Leak Through Log Files
3% (6) CWE-787 Out-of-bounds Write
3% (6) CWE-732 Incorrect Permission Assignment for Critical Resource
2% (5) CWE-522 Insufficiently Protected Credentials
2% (5) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (5) CWE-362 Race Condition
2% (5) CWE-352 Cross-Site Request Forgery (CSRF)
2% (5) CWE-266 Incorrect Privilege Assignment
2% (5) CWE-125 Out-of-bounds Read
2% (4) CWE-276 Incorrect Default Permissions
2% (4) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
1% (3) CWE-704 Incorrect Type Conversion or Cast
1% (3) CWE-287 Improper Authentication
1% (3) CWE-269 Improper Privilege Management
1% (3) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (2) CWE-706 Use of Incorrectly-Resolved Name or Reference
1% (2) CWE-552 Files or Directories Accessible to External Parties
1% (2) CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsa...
1% (2) CWE-295 Certificate Issues
1% (2) CWE-200 Information Exposure

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-02-27 Kibana Timelion prototype pollution code execution attempt
RuleID : 52835 - Type : SERVER-WEBAPP - Revision : 1
2019-06-11 Jenkins CI Server ASTTest code execution attempt
RuleID : 50041 - Type : SERVER-WEBAPP - Revision : 2
2019-04-23 Jenkins Groovy metaprogramming remote code execution attempt
RuleID : 49499 - Type : SERVER-WEBAPP - Revision : 1
2019-04-23 Jenkins Groovy metaprogramming remote code execution attempt
RuleID : 49498 - Type : SERVER-WEBAPP - Revision : 1
2019-02-07 Kibana Console for Elasticsearch local file inclusion attempt
RuleID : 48815 - Type : SERVER-WEBAPP - Revision : 3
2019-01-10 Kubernetes API Server bypass attempt
RuleID : 48548 - Type : SERVER-OTHER - Revision : 1
2019-01-08 Kubernetes API Server bypass attempt
RuleID : 48500 - Type : SERVER-OTHER - Revision : 1
2018-04-03 Jackson databind deserialization remote code execution attempt
RuleID : 45779 - Type : SERVER-OTHER - Revision : 1
2018-04-03 Jackson databind deserialization remote code execution attempt
RuleID : 45778 - Type : SERVER-OTHER - Revision : 1
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45016 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45015 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45014 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45013 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45012 - Type : FILE-OTHER - Revision : 4
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45011 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45010 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45009 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45008 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45007 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45006 - Type : FILE-OTHER - Revision : 4
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45005 - Type : FILE-OTHER - Revision : 4
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45004 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45003 - Type : FILE-OTHER - Revision : 3
2017-12-29 Jackson databind deserialization remote code execution attempt
RuleID : 45002 - Type : FILE-OTHER - Revision : 3
2016-03-29 Java Library CommonsCollection unauthorized serialized object attempt
RuleID : 37860 - Type : SERVER-WEBAPP - Revision : 5

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-11 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZA-2018-077.nasl - Type: ACT_GATHER_INFO
2019-01-10 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2019-1138.nasl - Type: ACT_GATHER_INFO
2019-01-08 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2019-1010.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-56221eb24b.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-0b038c7047.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-12b934e224.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-314913636b.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-381ab64b59.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-54a5bcc7e4.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-81ee973d7c.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-9dbe983805.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-bf292e6cdf.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-c8c7d35b83.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-ca03363d57.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-fb2afee474.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1430.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1419.nasl - Type: ACT_GATHER_INFO
2018-12-18 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-2_0-0112.nasl - Type: ACT_GATHER_INFO
2018-12-14 Name: The remote Kubernetes server is affected by a proxy request handling vulnerab...
File: kube_cve_2018_1002105.nasl - Type: ACT_ATTACK
2018-12-10 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1393.nasl - Type: ACT_GATHER_INFO
2018-12-10 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1391.nasl - Type: ACT_GATHER_INFO
2018-12-07 Name: A job scheduling and management system hosted on the remote web server is aff...
File: jenkins_2_154.nasl - Type: ACT_GATHER_INFO
2018-12-07 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1110.nasl - Type: ACT_GATHER_INFO
2018-12-04 Name: The remote host contains an application affected by a privilege escalation vu...
File: kube_1_12_3.nasl - Type: ACT_GATHER_INFO
2018-12-01 Name: The remote Debian host is missing a security update.
File: debian_DLA-1601.nasl - Type: ACT_GATHER_INFO